19.09.2017 Views

the-web-application-hackers-handbook

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Index n G–H 863<br />

503 Service Unavailable,<br />

49<br />

Flash, 134–135<br />

bytecode, 141<br />

/crossdomain.xml, 525–526<br />

LSOs, 553<br />

same-origin policy, 525–526<br />

serialized data, 137–138<br />

font-family property, 518–519<br />

forced browsing, <strong>application</strong><br />

logic flaws, 411<br />

forgotten password, 584<br />

attackers using, 14<br />

format string vulnerabilities<br />

attackers, 644<br />

causes, 643<br />

detecting, 644<br />

hacker’s methodology, 838<br />

source code, 710<br />

forms<br />

HTML, 58–59<br />

au<strong>the</strong>ntication, 160–161<br />

client-side control of user<br />

input with, 127–133<br />

client-side data transmission<br />

with hidden, 118–120<br />

disabled elements, 131–133<br />

intercepting proxy<br />

modifying hidden,<br />

119–120<br />

length limits, 128–129<br />

script-based validation,<br />

129–131<br />

<strong>web</strong> functionality, 58–60<br />

400 Bad Request, 48<br />

brute-force techniques, 84<br />

401 Unauthorized, 48<br />

brute-force techniques, 84–85<br />

403 Forbidden, 49<br />

brute-force techniques, 84–85<br />

404 Not Found, 49<br />

405 Method Not Allowed, 49<br />

413 Request Entity Too<br />

Large, 49<br />

414 Request URI Too Long,<br />

49<br />

framebusting, UI redress<br />

attacks, 514–515<br />

function callbacks, JavaScript<br />

hijacking, 520<br />

functional paths, <strong>web</strong><br />

<strong>application</strong> pages versus,<br />

93–96<br />

functionality. See <strong>web</strong><br />

functionality<br />

function-specific input<br />

vulnerabilities, hacker’s<br />

methodology, 836–841<br />

fuzzing, 572–573<br />

Burp Intruder, 600–602<br />

hacker’s methodology,<br />

parameter, 824–827<br />

integrated testing suites,<br />

762–763<br />

JAttack, 588–590<br />

objective, 586–587<br />

strings, 587<br />

G<br />

general headers, 45<br />

generic error messages, 628<br />

GET method, 42<br />

purpose, 264<br />

GET request, 40<br />

XSS converting, 474–475<br />

getCurrentUserRoles<br />

method, 261<br />

GIFAR files, 485–486<br />

Google, 89<br />

Omitted Results, 90<br />

querying, 90<br />

Google Translate (GT), 530–531<br />

Gray Hat Hacking (Eagle & Harris<br />

& Harper & Ness), 634<br />

GT. See Google Translate<br />

H<br />

hacker’s methodology<br />

access controls<br />

insecure access, 823<br />

limited access, 822–823<br />

multiple accounts, 822<br />

requirements, 821<br />

analysis<br />

attack surface mapping, 800<br />

data entry points, 799<br />

functionality, 798–799<br />

technologies, 799–800<br />

<strong>application</strong> logic flaws<br />

attack surface, 842<br />

incomplete input, 843<br />

multistage functions,<br />

842–843<br />

transaction logic, 844<br />

trust relationships, 844<br />

<strong>application</strong> mapping, 795–798<br />

debug parameters, 798<br />

default content, 797<br />

enumerating identifiers,<br />

797–798<br />

hidden content, 796–797<br />

public information resources,<br />

796<br />

of tokens to sessions, 818<br />

visible content, 795–796<br />

au<strong>the</strong>ntication<br />

<strong>application</strong> logic flaws,<br />

811–813<br />

credentials, autogenerated,<br />

809–810<br />

credentials, unsafe<br />

distribution, 810–811<br />

credentials, unsafe<br />

transmission, 810<br />

impersonation, 808–809<br />

insecure <strong>web</strong> storage, 811<br />

password guessing, 807<br />

password quality, 806<br />

password recovery, 807–808<br />

“remember me” functions,<br />

808<br />

understanding, 805<br />

username enumeration,<br />

806–807<br />

username uniqueness, 809<br />

vulnerability exploitation for<br />

unauthorized access,<br />

813<br />

back-end request injection, 841<br />

browser extensions, 802–804<br />

ActiveX controls, 804<br />

debugger, 803–804<br />

decompiling, 802–803<br />

buffer overflow, 837–838<br />

client-side<br />

data transmission, 801<br />

user input, 801–802<br />

cookie scope, 820–821<br />

CSRF, 820<br />

DOM, 849–850<br />

file inclusion, 835–836<br />

format string vulnerabilities,<br />

838<br />

fuzzing parameters, 824–827<br />

guidelines, 793–794<br />

HTTP header injection, 830<br />

information leakage, 852<br />

input-based vulnerabilities,<br />

824–836<br />

function-specific, 836–841<br />

integer vulnerabilities, 838<br />

LDAP injection, 839–840<br />

local privacy attacks, 850–851<br />

miscellaneous checks, 849–852<br />

native software bugs, 837–838<br />

open redirection<br />

vulnerabilities, 830–831<br />

OS command injection,<br />

832–833<br />

path traversal vulnerabilities,<br />

833–835<br />

reflected XSS, 829–830<br />

same-origin policy, 851–852

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!